Question:
Enumeration. This is the second step in the penetration test methodology and builds on the information gathered during the discovery phase and is specifically directed at the targeted systems, applications, and networks.
Author: John IntindoloAnswer:
Which step of a penetration test involves performing port scans to discover information about a target? - Exploitation - Enumeration - Reconnaissance - Vulnerability mapping
0 / 5 Â (0 ratings)
1 answer(s) in total